Information security

We help you protect your information. 

Nowadays, handling sensitive data is of high importance for both, clients and customers. However, digitalization in all areas offers a high potential for attack. In recent years, digital attacks on companies have become more frequent. Although naming a data protection officer offers you legal protection, it only helps you to a limited extent in the event of an attack.

The most effective protection against such attacks is provided by an IT security and information security concept tailored to your company.  Based on standards which, in addition to best practices, also provide a uniform structure and assessment basis. Such an information security management system is implemented, operated and then continuously improved. Our security experts bring the necessary experience and a structured way of working to perfectly tailor the ISMS to your company. We help you with both the implementation and with the realization. 

We are your competent partner for information security

Information security is a top priority for us! We continuously train and educate our employees in this area. Our expertise in this area is also reflected in the success of our clients who have passed their assessment and are living a successful ISMS (Information Security Management System). 


Regardless of whether your system is still at the beginning or just need the finishing touches - we will be happy to advise you and support you in setting up your information security management system. 

Our experts support you in audits for TISAX®*  as well as for 
ISO/IEC 2700x.

Our services

One model specified for the automotive industry is TISAX®, which was derived from the ISO/IEC 27001 standard. Here, the implementation of the ISMS and its evaluation take place based on requirement catalogues (VDA ISA). The ISMS is evaluated by ENX®-accredited testing service providers. Each successful assessment is confirmed by a TISAX® label. The ENX® platform serves as a management interface for publishing, sharing, and managing the corresponding labels held by a company.  

More and more car manufacturers expect their cooperation partners and suppliers to have a valid TISAX® label to ensure that sensitive information and data of the car manufacturer is handled with care. 

For a potential cooperation with a client, it is advisable to proactively prepare for these requirements and thus gain a possible advantage over competitors.

Support in
risk management


Participation in the documentation 

of processes, guidelines, and concepts

Coordination of all measures

for information security

Organizational interface

to audit service providers

Mediation of international contacts


Know How Transfer and best practices


The process

The implementation of an information security management system can be roughly divided into the following steps: 

Self-Assessment

You carry out a self-assessment of your ISMS and find out where there is potential for improvement.

GAP Analysis

We look at your environment and processes and compare them with the requirements of the VDA ISA.

Planning

Based on the findings of the GAP analysis, we define measures to achieve the requirements.

Implementation

If you wish, we can support you in implementing the defined measures in the form of best practices and white papers.

Audit

We accompany you step by step through the audit and support you throughout the entire process. 

Are you interested?

Regardless of whether you are still at the beginning, or your ISMS just needs the finishing touches - we will be happy to advise and support you!

*TISAX® is a registered trademark of the ENX®-Association